upstream: mention that DisableForwarding is valid in a sshd_config

Match block reported by Fredrik Eriksson in bz3239

OpenBSD-Commit-ID: 3a71c3d84b597f5e43e4b40d5232797daf0993f6
This commit is contained in:
djm@openbsd.org 2021-01-08 02:19:24 +00:00 committed by Damien Miller
parent 91bac5e95b
commit 16448ff529

View File

@ -33,8 +33,8 @@
.\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF .\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
.\" THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. .\" THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
.\" .\"
.\" $OpenBSD: sshd_config.5,v 1.319 2020/12/29 00:59:15 djm Exp $ .\" $OpenBSD: sshd_config.5,v 1.320 2021/01/08 02:19:24 djm Exp $
.Dd $Mdocdate: December 29 2020 $ .Dd $Mdocdate: January 8 2021 $
.Dt SSHD_CONFIG 5 .Dt SSHD_CONFIG 5
.Os .Os
.Sh NAME .Sh NAME
@ -1186,6 +1186,7 @@ Available keywords are
.Cm ClientAliveInterval , .Cm ClientAliveInterval ,
.Cm DenyGroups , .Cm DenyGroups ,
.Cm DenyUsers , .Cm DenyUsers ,
.Cm DisableForwarding ,
.Cm ForceCommand , .Cm ForceCommand ,
.Cm GatewayPorts , .Cm GatewayPorts ,
.Cm GSSAPIAuthentication , .Cm GSSAPIAuthentication ,